Oisin Crawford who tragicallty died yesterdayHEALTH chiefs and Gardai are in a race against time to find the evil drug dealers who dished out deadly e tabs to young men, leaving one dead and four in hospital.Tragic Oisin Crawford was killed yesterday morning after attending a party at a house in St Johnston.There has been a huge outpouring of sympathy to his family, including well-respected Seamus Crawford who runs a tyre business in Raphoe. Oisin was just 22.Prayers are being said for his friend Simon Lynch, also 22, who remains in a critical condition in hospital.His father Liam has called on the public to help Gardaí to catch those behind the evil drugs trade.Officers are hoping to take statements today from all those who were at the house party on St Johnston’s Main Street in the early hours of yesterday in the hope of tracing vital witnesses who might be able to help catch the dealers. Oisin is the latest victim of the drugs trade – and the trade in ecstasy tablets containing deadly chemicals.The so-called ‘bad batch’ of drugs has killed several other people in Ireland this year including a 16-year-old boy.The HSE has already identified the names of the drugs involved in the tragic Donegal case.They are called Double Black or Double Cross.Anyone with information should give it to their nearest Garda station or via the confidential telephone. The Garda Confidential Telephone Line is 1800 666 111.RACE ON TO FIND DONEGAL DEALERS BEHIND DEADLY BATCH OF DRUGS was last modified: May 27th, 2014 by John2Share this:Click to share on Facebook (Opens in new window)Click to share on Twitter (Opens in new window)Click to share on LinkedIn (Opens in new window)Click to share on Reddit (Opens in new window)Click to share on Pocket (Opens in new window)Click to share on Telegram (Opens in new window)Click to share on WhatsApp (Opens in new window)Click to share on Skype (Opens in new window)Click to print (Opens in new window)Tags:deaddouble blackdouble crossdrugs tradeGardaiOisin CrawfordWarning
Are there any challenges developers should be aware of when using namespaces? The main challenge is that you don’t have the full isolation that you get with true virtualization, and that does have some security implications. For example, although the container can only see its own running processes, the host machine has a view of everything that is running inside all containers, and – as I’ll show in my talk – all their environment variables. If you’re using environment variables to pass secrets (like, say, database passwords) into your containers, they’ll be accessible from the host machine. That may not be an issue for all users, but it is a serious concern for some. Fortunately there are solutions, including Aqua Security, to prevent secrets being leaked to the host through the environment like this. What are the some types of namespaces, and how are they used? There are currently namespaces for the hostname, process IDs, user and group IDs, mounts, networking and inter-process communications. Some of these are absolutely essential to containerization, whereas others are only needed in certain circumstances. For example, Docker has supported user and group ID mapping since 1.10 leveraging the user / group namespace, but I think it would be fair to say that it’s only used by a minority as it’s not needed in a lot of use cases. Most people can simply use containers without worrying about the nuts and bolts of how they are put together, but if you’re interested in what’s going on under the covers there are some interesting challenges around the way namespaces interact with each other and with the host.What do you hope developers will take away from your talk?As well as namespaces, I’ll be talking about cgroups. If a namespace limits what a container can see, a cgroup limits the resources it can use, like memory or CPU. I’ll be demonstrating all of this by writing my own container in Go, and then I’m going to subject it to a security exploit to test whether I have really isolated my container from the rest of the machine. If you like live coding and demos, and you want to really understand what’s going on when you run code in a container, you should definitely come along. Everyone is talking about containers these days, but what do containers actually mean for software development? There are many different pieces involved to put a successful containerized application together. SD Times caught up with Liz Rice, technology evangelist for container security specialist Aqua Security, to talk about a very important piece: Namespaces. Rice will be speaking at this week’s DockerCon about namespaces, and what they can do for containers. RELATED CONTENT: Controlling software through containers and microservicesSD Times: What are namespaces, and why are they necessary for containers?Rice: Namespaces are one of the key building blocks that are used to create containers. When you start a process on Linux, you can ask the kernel to give the process its own namespaces, and that means it has a restricted view of what’s going on. So for example when you look at the list of running processes within a container, you only see the ones inside that container and none of the processes running elsewhere on the machine. It’s namespacing that gives the container this constrained view. I’ll be demonstrating exactly how it works in my talk at DockerCon. What are the benefits to using namespaces?Namespaces are an incredibly lightweight way to isolate containers from each other. From inside the container, it looks a lot like being inside a virtual machine, but there’s none of the overhead of a hypervisor. Starting a virtual machine can take minutes, whereas starting a container is almost instantaneous.